Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 16:51
Behavioral task
behavioral1
Sample
JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe
-
Size
327KB
-
MD5
6e69dc66ce45e54c228e317dd8675854
-
SHA1
cea962890c7e256ac8181aff339f59970008a0c0
-
SHA256
cb669fb7866317185b8524b974bc3fafa65336274c142d406b452b2a5b8ff564
-
SHA512
ab990eaf5d5256e9c3bc6259b84e26132c369e23624ee504b400db5fc4887837f9e81705a720f11e47eddc26d052d69c9ba42db4abae9cb45e747586d7d49f10
-
SSDEEP
6144:t2UL2i9F/NTutkrLgGDLRPfr2UL2i9F/NTutkrLgGDLRPft:t2sF/N9DFPfr2sF/N9DFPft
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2108-2-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2108 JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe 2108 JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e69dc66ce45e54c228e317dd8675854.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2108